Sciweavers

2989 search results - page 521 / 598
» Process Management in a Distributed Operating System
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 7 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
CIKM
2004
Springer
15 years 7 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
SIGMETRICS
2003
ACM
147views Hardware» more  SIGMETRICS 2003»
15 years 7 months ago
Effect of node size on the performance of cache-conscious B+-trees
In main-memory databases, the number of processor cache misses has a critical impact on the performance of the system. Cacheconscious indices are designed to improve performance b...
Richard A. Hankins, Jignesh M. Patel
IPSN
2003
Springer
15 years 7 months ago
Meteorology and Hydrology in Yosemite National Park: A Sensor Network Application
Over half of California’s water supply comes from high elevations in the snowmelt-dominated Sierra Nevada. Natural climate fluctuations, global warming, and the growing needs of ...
Jessica D. Lundquist, Daniel R. Cayan, Michael D. ...
EDBTW
2006
Springer
15 years 6 months ago
Using Temporal Semantics for Live Media Stream Queries
Querying live media streams is a challenging problem that becomes an essential requirement in a growing number of applications. We address the problem of evaluating continuous quer...
Bin Liu, Amarnath Gupta, Ramesh Jain